

{"id":1948,"date":"2013-01-27T18:29:45","date_gmt":"2013-01-27T23:29:45","guid":{"rendered":"http:\/\/rud.is\/b\/?p=1948"},"modified":"2017-04-02T22:51:38","modified_gmt":"2017-04-03T03:51:38","slug":"once-more-into-the-prc-aggregated-breaches","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/","title":{"rendered":"Once More Into The [PRC Aggregated] Breaches"},"content":{"rendered":"<p>If you&#8217;re not on the <span class=\"removed_link\" title=\"http:\/\/www.securitymetrics.org\/content\/Wiki.jsp\">SecurityMetrics<\/span>.org mailing list you missed an interaction about the Privacy Rights Clearinghouse <a href=\"https:\/\/www.privacyrights.org\/data-breaches\">Chronology of Data Breaches<\/a> data source started by Lance Spitzner (@lspitzner). You&#8217;ll need to subscribe to the list see the thread, but one innocent question put me down the path to taking a look at the aggregated data with the intent of helping folks understand the overall utility\/efficacy of it when trying to craft messages from it. <\/p>\n<p>Before delving into the data, please note that PRC does an <a href=\"https:\/\/www.privacyrights.org\/chronology-data-breaches-faq\">excellent job<\/a> detailing source material for the data. They fully acknowledge some of the challenges with it, but a picture (or two) is worth a thousand caveats. <em>(NOTE: Charts &#038; numbers have been produced from January 20th, 2013 data)<\/em>.<\/p>\n<p>The first thing I did was try to get a feel for overall volume:<\/p>\n<div style=\"text-align:left;padding-left:30px\">Total breach record entries across all years (2005-present): <b>3573<\/b><br \/>\nNumber of entries with &#8216;Total Records Lost&#8217; filled in: <b>751<\/b><br \/>\n% of entries with &#8216;Total Records Lost&#8217; filled in: <b>21.0%<\/b><\/div>\n<blockquote><p><strong>Takeaway #1:<\/strong> Be very wary of using any &#8220;<em>Total Records Breached<\/em>&#8221; data from this data set.<\/p><\/blockquote>\n<p>It may help to see that computation broken down by reporting source over the years that the data file spans:<\/p>\n<p><center><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1950\" data-permalink=\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/complete-records-by-source-across-years\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years.png?fit=600%2C600&amp;ssl=1\" data-orig-size=\"600,600\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"complete-records-by-source-across-years\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years.png?fit=300%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years.png?fit=510%2C510&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years.png?resize=510%2C510&#038;ssl=1\" alt=\"complete-records-by-source-across-years\" width=\"510\" height=\"510\" class=\"aligncenter size-large wp-image-1950\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years.png?resize=530%2C530&amp;ssl=1 530w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years.png?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years.png?resize=535%2C535&amp;ssl=1 535w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years.png?w=600&amp;ssl=1 600w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/center><\/p>\n<p>This view also gives us:<\/p>\n<blockquote><p><strong>Takeaway #2:<\/strong> Not all data sources span all years and some have very little data.<\/p><\/blockquote>\n<p>However, Lance&#8217;s original goal was to compare &#8220;human error&#8221; vs &#8220;technical hack&#8221;. To do this, he combined <code>DISC<\/code>, <code>PHYS<\/code>, <code>PORT<\/code> &#038; <code>STAT<\/code> into one category (accidental\/human :: <code>ACC-HUM<\/code>) and <code>HACK<\/code>, <code>CARD<\/code> &#038; <code>INSD<\/code> into another (malicious\/attack :: <code>MAL-ATT<\/code>). Here&#8217;s what that looks like when broken down across reporting sources across time:<\/p>\n<p><center><div id=\"attachment_1964\" style=\"width: 540px\" class=\"wp-caption aligncenter\"><a target=_blank href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-metatype-year.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1964\" data-attachment-id=\"1956\" data-permalink=\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/breach-count-metatype-year\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-metatype-year.png?fit=900%2C600&amp;ssl=1\" data-orig-size=\"900,600\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"breach-count-metatype-year\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-metatype-year.png?fit=300%2C200&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-metatype-year.png?fit=510%2C340&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-metatype-year.png?resize=510%2C340&#038;ssl=1\" alt=\"breach-count-metatype-year\" width=\"510\" height=\"340\" class=\"aligncenter size-large wp-image-1956\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-metatype-year.png?resize=530%2C353&amp;ssl=1 530w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-metatype-year.png?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-metatype-year.png?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-metatype-year.png?resize=535%2C356&amp;ssl=1 535w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-metatype-year.png?w=900&amp;ssl=1 900w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/a><p id=\"caption-attachment-1964\" class=\"wp-caption-text\">(click to enlarge)<\/p><\/div><\/center><\/p>\n<p>This view provides another indicator that one might not want to place a great deal of faith on the PRC&#8217;s aggregation efforts. Why? It&#8217;s highly unlikely that DatalossDB had virtually no breach recordings in 2011 (in fact, it&#8217;s more than unlikely, <span class=\"removed_link\" title=\"http:\/\/datalossdb.org\/search?utf8=%E2%9C%93&amp;query=2011&amp;commit=Search\">it&#8217;s not true<\/span>). Further views will show some other potential misses from DatalossDB.<\/p>\n<blockquote><p><strong>Takeaway #3:<\/strong> Do not assume the components of this aggregated data set are complete.<\/p><\/blockquote>\n<p>We can get a further feel for data quality and also which reporting sources are weighted more heavily (i.e. which ones have more records, thus implicitly placing a greater reliance on them for any calculations) by looking at how many records they each contributed to the aggregated population each year:<\/p>\n<p><center><div id=\"attachment_1964\" style=\"width: 540px\" class=\"wp-caption aligncenter\"><a target=_blank href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-source-year.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1964\" data-attachment-id=\"1964\" data-permalink=\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/breach-count-source-year\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-source-year.png?fit=900%2C600&amp;ssl=1\" data-orig-size=\"900,600\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"breach-count-source-year\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;(click to enlarge)&lt;\/p&gt;\n\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-source-year.png?fit=300%2C200&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-source-year.png?fit=510%2C340&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-source-year.png?resize=510%2C340&#038;ssl=1\" alt=\"(click to enlarge)\" width=\"510\" height=\"340\" class=\"size-large wp-image-1964\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-source-year.png?resize=530%2C353&amp;ssl=1 530w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-source-year.png?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-source-year.png?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-source-year.png?resize=535%2C356&amp;ssl=1 535w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-source-year.png?w=900&amp;ssl=1 900w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/a><p id=\"caption-attachment-1964\" class=\"wp-caption-text\">(click to enlarge)<\/p><\/div><\/center><\/p>\n<p>I&#8217;m not sure why 2008 &#038; 2009 have such small bars for Databreaches.net and PHIPrivacy.net, and you can see the 2011 gap in the DatalossDB graph.<\/p>\n<p>At this point, I&#8217;d (maybe) trust some aggregate analysis of the HHS (via PHI), CA Attorney General &#038; Media data, but would need to caveat any conclusions with the obvious biases introduced by each.<\/p>\n<p>Even with these issues, I really wanted a &#8220;big picture&#8221; view of the entire set and ended up creating the following two charts:<\/p>\n<p><center><div id=\"attachment_1970\" style=\"width: 540px\" class=\"wp-caption aligncenter\"><a target=_blank href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-type-year.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1970\" data-attachment-id=\"1970\" data-permalink=\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/breach-by-source-type-year\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-type-year.png?fit=1500%2C1400&amp;ssl=1\" data-orig-size=\"1500,1400\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"breach-by-source-type-year\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;(click to enlarge)&lt;\/p&gt;\n\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-type-year.png?fit=300%2C280&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-type-year.png?fit=510%2C475&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-type-year.png?resize=510%2C475&#038;ssl=1\" alt=\"(click to enlarge)\" width=\"510\" height=\"475\" class=\"size-large wp-image-1970\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-type-year.png?resize=530%2C494&amp;ssl=1 530w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-type-year.png?resize=150%2C140&amp;ssl=1 150w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-type-year.png?resize=300%2C280&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-type-year.png?resize=535%2C499&amp;ssl=1 535w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-type-year.png?w=1500&amp;ssl=1 1500w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-type-year.png?w=1020&amp;ssl=1 1020w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/a><p id=\"caption-attachment-1970\" class=\"wp-caption-text\">(click to enlarge)<\/p><\/div><\/p>\n<p><div id=\"attachment_1971\" style=\"width: 540px\" class=\"wp-caption aligncenter\"><a target=_blank href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-metatype-year.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1971\" data-attachment-id=\"1971\" data-permalink=\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/breach-by-source-metatype-year\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-metatype-year.png?fit=1500%2C1400&amp;ssl=1\" data-orig-size=\"1500,1400\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"breach-by-source-metatype-year\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;(click to enlarge)&lt;\/p&gt;\n\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-metatype-year.png?fit=300%2C280&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-metatype-year.png?fit=510%2C475&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-metatype-year.png?resize=510%2C475&#038;ssl=1\" alt=\"(click to enlarge)\" width=\"510\" height=\"475\" class=\"size-large wp-image-1971\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-metatype-year.png?resize=530%2C494&amp;ssl=1 530w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-metatype-year.png?resize=150%2C140&amp;ssl=1 150w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-metatype-year.png?resize=300%2C280&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-metatype-year.png?resize=535%2C499&amp;ssl=1 535w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-metatype-year.png?w=1500&amp;ssl=1 1500w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-metatype-year.png?w=1020&amp;ssl=1 1020w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/a><p id=\"caption-attachment-1971\" class=\"wp-caption-text\">(click to enlarge)<\/p><\/div><\/center><\/p>\n<p>(You&#8217;ll probably want to view the PDF documents of each : [<a target=_blank href=\"https:\/\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-type-year.pdf\">1<\/a>] [<a target=_blank href=\"https:\/\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-by-source-metatype-year.pdf\">2<\/a>] given how big they are.)<\/p>\n<p>Those charts show the number of breaches-by-type by month across the 2005-2013 span by reporting source. The only difference between the two is that the latter one is grouped by Lance&#8217;s &#8220;meta type&#8221; definition. These views enable us to see gaps in reporting by month (note the additional aggregation issue at the tail end of 2010 for DatalossDB) and also to get a feel for the trends of each band (note the significant increase in &#8220;unknown&#8221; in 2012 for DatalossDB).<\/p>\n<blockquote><p><strong>Takeaway #4:<\/strong> Do not ignore the &#8220;unknown&#8221; classification when performing analysis with this data set.<\/p><\/blockquote>\n<p>We can see other data issues if we look at it from other angles, such as the state the breach was recorded in:<\/p>\n<p><center><div id=\"attachment_1976\" style=\"width: 540px\" class=\"wp-caption aligncenter\"><a target=_blank href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-by-state.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1976\" data-attachment-id=\"1976\" data-permalink=\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/breach-count-by-state\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-by-state.png?fit=600%2C900&amp;ssl=1\" data-orig-size=\"600,900\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"breach-count-by-state\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;(click to enlarge)&lt;\/p&gt;\n\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-by-state.png?fit=200%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-by-state.png?fit=510%2C765&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-by-state.png?resize=510%2C765&#038;ssl=1\" alt=\"(click to enlarge)\" width=\"510\" height=\"765\" class=\"size-large wp-image-1976\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-by-state.png?resize=530%2C795&amp;ssl=1 530w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-by-state.png?resize=100%2C150&amp;ssl=1 100w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-by-state.png?resize=200%2C300&amp;ssl=1 200w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-by-state.png?resize=535%2C802&amp;ssl=1 535w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-count-by-state.png?w=600&amp;ssl=1 600w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/a><p id=\"caption-attachment-1976\" class=\"wp-caption-text\">(click to enlarge)<\/p><\/div><\/center><\/p>\n<p>We can see at least three issues (missing value and occurrences recorded not in the US) from this view, but it seems the number of breaches mostly <a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_U.S._states_and_territories_by_population\">aligns with population<\/a> (discrepancies make sense given the lack of uniform breach reporting requirements).<\/p>\n<p>It&#8217;s also very difficult to do any organizational analysis (I&#8217;m a big fan of looking at &#8220;repeat offenders&#8221; in general) with this data set without some significant data cleansing\/normalization. For example, all of these are &#8220;<em>Bank of America<\/em>&#8220;:<\/p>\n<pre lang=\"rsplus\">[1] \"Bank of America\"                                                             \r\n[2] \"Wachovia, Bank of America, PNC Financial Services Group and Commerce Bancorp\"\r\n[3] \"Bank of America Corp.\"                                                       \r\n[4] \"Citigroup, Inc., Bank of America, Corp.\"<\/pre>\n<p>Without any cleansing, here are the orgs with two or more reported breaches since 2005:<\/p>\n<p><iframe loading=\"lazy\" width=\"500\" height=\"300\" scrolling=\"yes\" frameborder=\"no\" src=\"https:\/\/www.google.com\/fusiontables\/embedviz?viz=GVIZ&amp;t=TABLE&amp;containerId=gviz_canvas&amp;q=select+col0%2C+col1%2C+col2+from+1XKN6rPpRKbVLMaC97xofOX5006Sz1G8R2n32Q-4\"><\/iframe><\/p>\n<p>(apologies for the <code>IFRAME<\/code> but Google&#8217;s Fusion Tables are far too easy to use when embedding data tables)<\/p>\n<blockquote><p><strong>Takeaway #5:<\/strong> Do not assume that just because a data set has been aggregated by someone and published that it&#8217;s been scrubbed well.<\/p><\/blockquote>\n<p>Even if the above sets of issues were resolved, the real details are in the &#8220;breach details&#8221; field, which is a free-form text field providing more information on who\/what\/when\/where\/why\/how (with varying degrees of consistency &#038; completeness). This is actually the information you really need. The <code>HACK<\/code> attribute is all well-and-good, but <span class=\"removed_link\" title=\"http:\/\/veriscommunity.net\/doku.php?id=enumerations#actionhackingvariety\">what kind of hack was it<\/span>? This is one area <span class=\"removed_link\" title=\"http:\/\/veriscommunity.net\/doku.php\">VERIS<\/span> shines. What advice are you going to give financial services (<code>BSF<\/code>) orgs from this extract:<\/p>\n<p><center><div id=\"attachment_1983\" style=\"width: 540px\" class=\"wp-caption aligncenter\"><a target=_blank href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-finserv-2006-2012.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1983\" data-attachment-id=\"1983\" data-permalink=\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/breach-finserv-2006-2012\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-finserv-2006-2012.png?fit=1000%2C300&amp;ssl=1\" data-orig-size=\"1000,300\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"breach-finserv-2006-2012\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;(click to enlarge)&lt;\/p&gt;\n\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-finserv-2006-2012.png?fit=300%2C90&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-finserv-2006-2012.png?fit=510%2C153&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-finserv-2006-2012.png?resize=510%2C153&#038;ssl=1\" alt=\"(click to enlarge)\" width=\"510\" height=\"153\" class=\"size-large wp-image-1983\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-finserv-2006-2012.png?resize=530%2C159&amp;ssl=1 530w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-finserv-2006-2012.png?resize=150%2C45&amp;ssl=1 150w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-finserv-2006-2012.png?resize=300%2C90&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-finserv-2006-2012.png?resize=535%2C160&amp;ssl=1 535w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/breach-finserv-2006-2012.png?w=1000&amp;ssl=1 1000w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/a><p id=\"caption-attachment-1983\" class=\"wp-caption-text\">(click to enlarge)<\/p><\/div><\/center><\/p>\n<p><code>HACK<\/code>s are up in 2012 from 2010 &#038; 2011, but what type of <code>HACK<\/code>s against what size organizations? Should smaller orgs be worried about desktop security and\/or larger orgs start focusing more on web app security? You can&#8217;t make that determination without mining that free form text field. (NOTE: as I have time, I&#8217;m trying to craft a repeatable text analysis function I can perform on that field to see what can be automatically extracted)<\/p>\n<blockquote><p><strong>Takeaway #6:<\/strong> This data set is pretty much what the PRC says it is: a chronology of data breaches. More in-depth analysis is not advised without a massive clean-up effort.<\/p><\/blockquote>\n<p>Finally, hypothesizing that the PRC&#8217;s aggregation could have resulted in duplicate records, I created a subset of the records based solely on breach &#8220;Date Made Public&#8221; + &#8220;Organization Name&#8221; and then sifted manually through the breach text details, <em>6 duplicate entries were found<\/em>. Interestingly enough, only one instance of duplicate records was found across reporting databases (my hunch was that DatalossDB or DataBreaches.NET would have had records other, smaller databases included; however, this particular duplicate detection mechanism does not rule this out given the quality of the data).<\/p>\n<h3>Conclusion\/Acknowledgements<\/h3>\n<p>Despite the criticisms above, the efforts by the PRC and their sources for aggregation are to be commended. Without their work to document breaches we would only have the mega-media-frenzy stories and labor-intensive artifacts like the <span class=\"removed_link\" title=\"http:\/\/www.verizonbusiness.com\/about\/events\/2012dbir\/\">DBIR<\/span> to work with. Just because the data isn&#8217;t perfect right now doesn&#8217;t mean we won&#8217;t get to a point where we have the ability to record and share this breach information like the CDC does diseases (which also ins&#8217;t perfect, btw). <\/p>\n<p>I leave you with another column of numbers that shows&mdash;if broken down by organization type <i>and<\/i> breach type&mdash;there is an average of 2 breaches per-breach\/org-type-per-year (according to this data):<\/p>\n<p><iframe loading=\"lazy\" width=\"500\" height=\"300\" scrolling=\"yes\" frameborder=\"no\" src=\"https:\/\/www.google.com\/fusiontables\/embedviz?viz=GVIZ&amp;t=TABLE&amp;containerId=gviz_canvas&amp;q=select+col0%2C+col1%2C+col2%2C+col3%2C+col4+from+112FO45IKCIyJEYdRNnqp2kc-HV3Qdpj5gDCkVu4\"><\/iframe><\/p>\n<p>(The complete table includes the mean, median and standard deviation for each type.)<\/p>\n<p>Lance&#8217;s final question to me (on the list) was &#8220;<i>Bob, what do recommended as the next step to answer the question &#8211; What percentage of publicly known data breaches are deliberate cyber attacks, and what percentage are human based accidental loss\/disclosure?<\/i>&#8221; <\/p>\n<p>I&#8217;d first start with a look at the DBIR (especially this year&#8217;s) and then see if I could get a set of grad students to convert a complete set of DatalossDB records (and, perhaps, the other sources) into VERIS format for proper analysis. <em>If any security vendors are reading this, I guarantee you&#8217;ll gain significant capital\/accolades within\/from the security practitioner community if you were to sponsor such an effort.<\/em><\/p>\n<p>Comments, corrections &#038; constructive criticisms are heartily welcomed. Data crunching &#038; graphing scripts available both on request and perhaps uploaded to my github repository once I clean them up a bit.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you&#8217;re not on the SecurityMetrics.org mailing list you missed an interaction about the Privacy Rights Clearinghouse Chronology of Data Breaches data source started by Lance Spitzner (@lspitzner). You&#8217;ll need to subscribe to the list see the thread, but one innocent question put me down the path to taking a look at the aggregated data [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[61,24,673,674,3],"tags":[],"class_list":["post-1948","post","type-post","status-publish","format-standard","hentry","category-breach","category-charts-graphs","category-datavis-2","category-dataviz","category-information-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Once More Into The [PRC Aggregated] Breaches - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Once More Into The [PRC Aggregated] Breaches - rud.is\" \/>\n<meta property=\"og:description\" content=\"If you&#8217;re not on the SecurityMetrics.org mailing list you missed an interaction about the Privacy Rights Clearinghouse Chronology of Data Breaches data source started by Lance Spitzner (@lspitzner). You&#8217;ll need to subscribe to the list see the thread, but one innocent question put me down the path to taking a look at the aggregated data [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2013-01-27T23:29:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-04-03T03:51:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years-530x530.png\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Once More Into The [PRC Aggregated] Breaches\",\"datePublished\":\"2013-01-27T23:29:45+00:00\",\"dateModified\":\"2017-04-03T03:51:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/\"},\"wordCount\":1346,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"image\":{\"@id\":\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years-530x530.png\",\"articleSection\":[\"Breach\",\"Charts &amp; Graphs\",\"DataVis\",\"DataViz\",\"Information Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/\",\"url\":\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/\",\"name\":\"Once More Into The [PRC Aggregated] Breaches - rud.is\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years-530x530.png\",\"datePublished\":\"2013-01-27T23:29:45+00:00\",\"dateModified\":\"2017-04-03T03:51:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years.png?fit=600%2C600&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years.png?fit=600%2C600&ssl=1\",\"width\":600,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/rud.is\/b\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Once More Into The [PRC Aggregated] Breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/rud.is\/b\/#website\",\"url\":\"https:\/\/rud.is\/b\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/rud.is\/b\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\/\/rud.is\"],\"url\":\"https:\/\/rud.is\/b\/author\/hrbrmstr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Once More Into The [PRC Aggregated] Breaches - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/","og_locale":"en_US","og_type":"article","og_title":"Once More Into The [PRC Aggregated] Breaches - rud.is","og_description":"If you&#8217;re not on the SecurityMetrics.org mailing list you missed an interaction about the Privacy Rights Clearinghouse Chronology of Data Breaches data source started by Lance Spitzner (@lspitzner). You&#8217;ll need to subscribe to the list see the thread, but one innocent question put me down the path to taking a look at the aggregated data [&hellip;]","og_url":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/","og_site_name":"rud.is","article_published_time":"2013-01-27T23:29:45+00:00","article_modified_time":"2017-04-03T03:51:38+00:00","og_image":[{"url":"https:\/\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years-530x530.png","type":"","width":"","height":""}],"author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Once More Into The [PRC Aggregated] Breaches","datePublished":"2013-01-27T23:29:45+00:00","dateModified":"2017-04-03T03:51:38+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/"},"wordCount":1346,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"image":{"@id":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years-530x530.png","articleSection":["Breach","Charts &amp; Graphs","DataVis","DataViz","Information Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/","url":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/","name":"Once More Into The [PRC Aggregated] Breaches - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#primaryimage"},"image":{"@id":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years-530x530.png","datePublished":"2013-01-27T23:29:45+00:00","dateModified":"2017-04-03T03:51:38+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#primaryimage","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years.png?fit=600%2C600&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/01\/complete-records-by-source-across-years.png?fit=600%2C600&ssl=1","width":600,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2013\/01\/27\/once-more-into-the-prc-aggregated-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Once More Into The [PRC Aggregated] Breaches"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-vq","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":11102,"url":"https:\/\/rud.is\/b\/2018\/07\/29\/ggplot-doodling-with-hibp-breaches\/","url_meta":{"origin":1948,"position":0},"title":"ggplot &#8220;Doodling&#8221; with HIBP Breaches","author":"hrbrmstr","date":"2018-07-29","format":false,"excerpt":"After reading this interesting analysis of \"How Often Are Americans' Accounts Breached?\" by Gaurav Sood (which we need more of in cyber-land) I gave in to the impulse to do some gg-doodling with the \"Have I Been Pwnd\" JSON data he used. It's just some basic data manipulation with some\u2026","rel":"","context":"In &quot;ggplot&quot;","block_context":{"text":"ggplot","link":"https:\/\/rud.is\/b\/category\/ggplot\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/07\/hibp-lines.png?fit=1200%2C588&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/07\/hibp-lines.png?fit=1200%2C588&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/07\/hibp-lines.png?fit=1200%2C588&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/07\/hibp-lines.png?fit=1200%2C588&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/07\/hibp-lines.png?fit=1200%2C588&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1376,"url":"https:\/\/rud.is\/b\/2012\/06\/23\/breach-reach-google-insights\/","url_meta":{"origin":1948,"position":1},"title":"Breach Reach : Google Insights","author":"hrbrmstr","date":"2012-06-23","format":false,"excerpt":"UPDATE: I had to remove the Google Insight widgets and replace them with static images. There was inconsistent loading far too often in non-Chrome browsers. Click on the graphs to go to the Google Insights detail pages for more interaction with the data. Information security breaches have been the \"new\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1033,"url":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/","url_meta":{"origin":1948,"position":2},"title":"Off By One : The Importance Of Fact Checking Breach Reports","author":"hrbrmstr","date":"2012-05-10","format":false,"excerpt":"I didn't read through the Massachusetts 2011 Report on Data Breach Notifications\u00a0[PDF] until recently, but once I went through the report my brain kept telling me \"something is wrong\". Not something earth shattering, but more of a \"something is off\" signal. This happens more than I'd like as I tend\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4886,"url":"https:\/\/rud.is\/b\/2017\/01\/16\/the-devils-in-the-davos-details-a-quick-look-at-this-years-wef-global-risks-report\/","url_meta":{"origin":1948,"position":3},"title":"The Devil&#8217;s in the [Davos] Details \u2014 A quick look at this year&#8217;s WEF Global Risks Report","author":"hrbrmstr","date":"2017-01-16","format":false,"excerpt":"It's Davos time again. Each year the World Economic Forum (WEF) gathers the global elite together to discuss how they're going to shape our collective future. WEF also releases their annual Global Risks Report at the same time. I read it every year and have, in the past, borrowed some\u2026","rel":"","context":"In &quot;R&quot;","block_context":{"text":"R","link":"https:\/\/rud.is\/b\/category\/r\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/01\/Cursor_and___Development_devils_in_the_davos_-_RStudio-4.png?fit=1200%2C536&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/01\/Cursor_and___Development_devils_in_the_davos_-_RStudio-4.png?fit=1200%2C536&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/01\/Cursor_and___Development_devils_in_the_davos_-_RStudio-4.png?fit=1200%2C536&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/01\/Cursor_and___Development_devils_in_the_davos_-_RStudio-4.png?fit=1200%2C536&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/01\/Cursor_and___Development_devils_in_the_davos_-_RStudio-4.png?fit=1200%2C536&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":754,"url":"https:\/\/rud.is\/b\/2012\/01\/03\/businessweek-infographic-illustrates-the-pounding-we-took-in-2011\/","url_meta":{"origin":1948,"position":4},"title":"Businessweek Infographic Illustrates The Pounding We Took In 2011","author":"hrbrmstr","date":"2012-01-03","format":false,"excerpt":"Another #spiffy tip from @MetricsHulk: Evan Applegate put together a great & simple infographic for Businessweek that illustrates the number and size of 2011 data breaches pretty well. (Click for larger version) The summary data (below the timeline bubble chart) shows there was a 37.4% increase in reported incidents and\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11837,"url":"https:\/\/rud.is\/b\/2019\/01\/30\/quick-hit-using-seymour-to-subscribe-to-your-gitlahub-repo-issues-in-feedly\/","url_meta":{"origin":1948,"position":5},"title":"Quick Hit: Using seymour to Subscribe to your Git[la|hu]b Repo Issues in Feedly","author":"hrbrmstr","date":"2019-01-30","format":false,"excerpt":"The seymour? Feedly API package has been updated to support subscribing to RSS\/Atom feeds. Previously the package was intended to just treat your Feedly as a data source, but there was a compelling use case for enabling subscription support: subscribing to code repository issues. Sure, there's already email notice integration\u2026","rel":"","context":"In &quot;R&quot;","block_context":{"text":"R","link":"https:\/\/rud.is\/b\/category\/r\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=1948"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1948\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=1948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=1948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=1948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}